POPULARITY
Categories
The real edge in cybersecurity isn't found in new tools, it's built through timeless fundamentals and a mindset that never stops learning. In this episode, Ron sits down with Rich Greene, Senior Solutions Engineer and Instructor at SANS Institute, to uncover how true cyber value starts with skills, curiosity, and mindset. Rich shares his remarkable story of surviving a battlefield injury, retraining his brain, and how that journey shaped his approach to mastering cybersecurity. Together, they connect real-world lessons like the recent Discord breach to the core truth that even advanced systems depend on people who master the basics. Impactful Moments 00:00 - Introduction 02:00 - Discord breach and third-party risk 05:00 - Meet Rich Greene from SANS 06:00 - The power of mastering fundamentals 07:00 - Learning how to learn 08:30 - Rich's story of rebuilding his memory 11:00 - Forcing the brain to grow stronger 12:00 - Top skills that get you paid 14:00 - Skills that lead to fulfillment 16:00 - Fundamentals that fuel long-term success 17:00 - The OSI model decoded 20:00 - Why operating systems matter 21:00 - Security operations fundamentals 23:00 - Why cloud is the #1 must-learn skill 25:00 - Final advice: sharpen your fundamentals Links Connect with our Rich on LinkedIn: https://www.linkedin.com/in/secgreene/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Phil Rossi Returns!Take a walk with me down Fascination Street as I get to know even more about Phil Rossi, as he and I catch since his last appearance 7 years ago. Phil is one of the ORIGINAL podcasters. He first started podcasting his unpublished speculative fiction novels twenty years ago! In this episode, I fanboy out a little bit as Phil is on the Mount Rushmore of podcasting in my opinion. Then we move on to discuss his first ever novel 'Crescent' and why he is re-releasing it with a few changes. Next he spills the beans that he is also working on a sequel to Crescent! A few years ago, Phil started a podcast called Don't Turn Around; which focuses on the scary and the paranormal in our everyday lives. So we talk a bit about that and why he started it. More recently, Phil started another podcast called It Came From The Web, where he introduces and comments on paranormal videos and sightings that he finds on the internet. Then, He teamed up with fellow old scool podcasters Tee Morris and Philippa Balentine to form Old Spirits Investigations; a YouTube show where these three investigators are exploring purported haunted areas. So, we discuss all three of these shows, why they got started, and what the listener or viewer can expect from these shows. Phil even shares some personal stories of spooky and unexplainable events that happened in his own life. Make sure you check out the 2 audio podcasts, as we as the video podcast on YouTube. Phil, Tee, and Philippa are the bee's knees!!!
An Interview With Dan Walters Dan Walters/Bytetinker joins us after a long email chain to find a time. You'll understand why it was so hard in the interview. Jen met Dan at cyphercon.com where he runs an ISP hacking village/ward. We covered a lot of stuff at various levels of the OSI stack up. Here's just a short list of terms that came up: DOCSIS Quadrature_amplitude_modulation Some of the exploits we covered were part of Cable Haunt. While Dan for good reason did not provide explicit sites to get started with, you may have luck with archive.org Want to try this for yourself but still waiting for your federal funding to come in? cyphercon.com 2026 is happening and you can do this much more cheaply. It's happening April 1 & 2. Have comments or suggestions for us? Find us on twitter @unnamed_show, or email us at show@unnamedre.com. Music by TeknoAxe (http://www.youtube.com/user/teknoaxe)
Nat's back from seeing Osi & Sam in the Five studio - next stop Dublin! - and is straight into unpicking a wild Week 3 in the NFL, and who better to get into the craziness than comedian and All-Pro member of the NC Show crew Marek Larwood! The fellas breaking down some of the 3–0 contenders, the 0–3 fall guys and piece together the wild special teams chaos, and defensive x-factors that generated some extraordinary results in a bonkers slate! Are the Bears back, or are the Cowboys that bad? Are Colts and Chargers for real, real? Will the Rams be fine despite their meltdown? Are the Chiefs gonna make the playoffs? And will the Giants deal Russ? Plus LT bossing it, Marek's reveals which exclusive WhatsApp group he's a member of as well as another classic email from the Commish! ___ To sign up for FanTeam our brand new partners hit the link : https://af.fanteam.com/click?o=1&a=99082&c=1 - use the code RUSH to unlock special offers for followers of The NC Show! Get involved in the Edge Rush Boosted Acca, the TNF Freeroll contest - free to enter - and more! FanTeam is the ultimate home for NFL fans in the UK, with season-long, weekly, and daily fantasy contests featuring regular five-figure guaranteed prize pools. Users have to be 18+, please play responsibly, BeGambleAware.org ___ Smokin' BBQ, ice-cold beers, and all the NFL action you can handle throughout the season. What's not to love, people? Check out Hickory's Smokehouse here: https://hickorys.co.uk ___ Check out the official Nat Coombs Show music playlist: http://open.spotify.com/playlist/0i1nSLaUJWxZMGCe8eJLQY ___ BONUS CONTENT! Subscribe to our YouTube Channel: https://www.youtube.com/@TheNCShow ___ Follow Nat on X or Instagram: X (Twitter): https://twitter.com/natcoombs Instagram: https://www.instagram.com/natcoombs ___ NC Show socials: X (Twitter): https://twitter.com/thencshow Facebook: https://www.facebook.com/thencshow Instagram: https://www.instagram.com/thencshow/ Tik Tok: https://www.tiktok.com/@thencshow?lang=en Threads: https://www.threads.net/@thencshow Learn more about your ad choices. Visit podcastchoices.com/adchoices
In this deep dive episode, we explore the evolution of networking with Avery Pennarun, Co-Founder and CEO of Tailscale. Avery shares his extensive journey through VPN technologies, from writing his first mesh VPN protocol in 1997 called “Tunnel Vision” to building Tailscale, a zero-trust networking solution. We discuss how Tailscale reimagines the OSI stack by... Read more »
S.O.S. (Stories of Service) - Ordinary people who do extraordinary work
A life's trajectory derailed by a single night, a textbook case of injustice unfolding at one of America's most prestigious military academies. This urgent special episode of Stories of Service brings to light the troubling case of Joseph Fernau, a wrestler and former Air Force Academy cadet fighting to save his military career and avoid crushing debt after being falsely accused of sexual assault.When a devastating ankle injury sidelined Fernau from his beloved wrestling team, he made a mistake while heavily medicated - fraternizing with a freshman cadet. What followed defies belief: months later, after he began dating someone new, came an accusation of sexual assault that threatened everything he'd worked for. Despite text messages clearly showing consent before and satisfaction after their encounter, and despite OSI investigators finding the assault allegation unfounded, Fernau now faces disenrollment and $240,000 in debt while his accuser transferred to Stanford without consequences.The episode reveals disturbing inconsistencies in how military discipline is administered, with numerous examples of cadets committing similar or worse violations receiving far lighter punishments. Captain Adam DeRito, himself a veteran of a 15-year battle with the Academy over his own case, provides crucial context about potential bias and command influence affecting the proceedings. The conversation raises profound questions about who receives second chances in our military, and whether factors like identity politics might be corrupting the process of justice.Whether you're connected to military service or simply care about fairness in our institutions, this case demands attention. As Fernau's appeal reaches the Secretary of the Air Force, the fundamental question remains: Should one mistake, immediately self-reported and followed by exemplary conduct, end a promising military career? Listen now and decide for yourself.Support the showVisit my website: https://thehello.llc/THERESACARPENTERRead my writings on my blog: https://www.theresatapestries.com/Listen to other episodes on my podcast: https://storiesofservice.buzzsprout.comWatch episodes of my podcast:https://www.youtube.com/c/TheresaCarpenter76
Send us a textCheck us out at: https://www.cisspcybertraining.com/Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkoutGet access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouvNetwork security is the cornerstone of modern cybersecurity, and understanding its intricacies is essential for anyone preparing for the CISSP exam. In this comprehensive episode, Sean Gerber delivers a rapid review of Domain 4: Communications and Network Security, which constitutes 13% of the CISSP exam questions.The episode opens with a cautionary tale about a disgruntled Chinese developer who received a four-year prison sentence for deploying a logic bomb that devastated his former employer's network. This real-world example underscores the critical importance of proper employee termination procedures and privilege management—especially for technical staff with elevated access. As Sean emphasizes, "The eyes of Sauron" should be on any high-privilege employee showing signs of discontent.Diving into Domain 4, Sean expertly navigates through foundational concepts like the OSI and TCP/IP models, explaining how they standardize network communications and why security professionals must understand them to implement effective defense strategies. The discussion progresses through IP networking (both IPv4 and IPv6), secure protocols, multi-layer protections, and deep packet inspection—all crucial components of a robust security architecture.Particularly valuable is Sean's breakdown of modern network technologies like micro-segmentation, which divides networks into highly granular security zones. While acknowledging its power to limit lateral movement during breaches, he cautions that implementation requires sophisticated knowledge of software-defined networking (SDN) and careful planning: "It's better to start small than to go out and think of and get too big when you're dealing with deploying these SDN type of capabilities."Wireless security, content delivery networks, and endpoint protection receive thorough examination, with Sean emphasizing that endpoints are "your first line of detection" and advocating for comprehensive endpoint detection and response (EDR) solutions that go beyond traditional antivirus. The episode concludes with insights on voice communication security, contrasting traditional telephone networks with modern VoIP systems and their unique vulnerabilities.Whether you're preparing for the CISSP exam or looking to strengthen your organization's network security posture, this episode provides actionable insights backed by real-world experience. Ready to deepen your understanding of cybersecurity fundamentals? Subscribe to the CISSP Cyber Training Podcast and check out the free resources available at cisspybertraining.com to accelerate your certification journey.Support the showGain exclusive access to 360 FREE CISSP Practice Questions delivered directly to your inbox! Sign up at FreeCISSPQuestions.com and receive 30 expertly crafted practice questions every 15 days for the next 6 months—completely free! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
In this episode, Dr. Megan McElheran, a clinical psychologist and CEO of Before Operational Stress, Inc. discusses stoicism's practical applications and the misinterpretations associated with it. Dr. McElheran shares her extensive work with trauma-exposed professionals, including military personnel and first responders, and highlights the importance of managing stress and trauma. Marcus and Dr. McElheran delve into the concept of post-traumatic growth, the necessity of facing adversities, and maintaining mental health resilience. The conversation also touches on Dr. McElheran's Bataan Death March experience, underscoring the significant lessons in resilience and determination. Episode Highlights: 02:29 The Misconceptions of Stoicism 08:04 The Impact of Trauma on First Responders 29:32 Stoic Wisdom for Overcoming Hardship 31:10 The Hero's Journey and Personal Growth 32:22 Embracing Pain and Suffering 37:55 Curating Thoughts and Building Confidence 40:20 The Bataan Death March: A Lesson in Endurance Dr. Megan McElheran, CEO of Wayfound Mental Health Group in Calgary, AB, is a Clinical Psychologist with 16 years of expertise in Operational Stress Injuries (OSI). Specializing in active-duty military, Veterans, and public safety personnel, she focuses on assessment, diagnosis, and treatment. Driven by a passion for OSI prevention and resilience enhancement, she developed the BOS program. Exploring innovative approaches, she's delving into psychedelic medicine for psychological injuries. A sought-after speaker and educator, Dr. McElheran shares her insights nationally. Her recent publication in the European Journal of Psychotraumatology, "Functional Disconnection and Reconnection," sheds light on novel strategies for public safety personnel's well-being. You can find out more here: https://www.beforeoperationalstress.com/ Learn more about the gift of Adversity and my mission to help my fellow humans create a better world by heading to www.marcusaureliusanderson.com. There you can take action by joining my ANV inner circle to get exclusive content and information.See omnystudio.com/listener for privacy information.
Adjacent to the Willowemoc Wild Forest, in the Sullivan Catskills, a 3100-acre parcel once eyed for development is now safeguarded for future generations. In this episode, we chronicle the Open Space Institute's landmark deal, and potentially the largest acquisition for the Catskills in nearly 25 years.From the quiet negotiations with landowners to the sweeping implications for climate resilience and watershed health, this episode dives deep into what makes Blue Hill so important to the region. Key highlights include:Behind-the-scenes details on how OSI's team identified and secured the propertyThe role of Blue Hill in protecting coldwater streams critical to downstream communitiesA look back at Blue Hill's brushes with development, including a ski resort derailed by liquor restrictions What the public can expect in terms of access, trails, and community engagementReflections on regional conservation wins and what they signal for the futureHear from Tom Gravel, OSI's Northeast Project Manager, and Charlie Burgess, OSI's Northern NY Stewardship Manager about OSI's strategic land acquisitions—and how they are advancing New York's commitment to conserve 30% of its lands and waters by 2030 under the state's 30x30 initiative.
Send us a textForget the Instagram highlight reels—Peaches and Aaron are dropping the unfiltered, step-by-step hacks to survive the Air Force Special Warfare pipeline without becoming another quit statistic. This isn't “drink more water” fluff; it's the down-and-dirty, why-your-shins-are-dying, how-to-not-faceplant-on-the-IFT kind of episode. From running until you hate life, to fueling like a machine, to training until your friends think you've joined a cult, they break down exactly how to build durability, crush run times, and show up already dangerous. Plus, a SIG P320 scandal, why OTS Nashville is about to sell out, and how to tell if you're lying to yourself about being “ready.”
Osoby, które określane są mianem Strategów, tworzą alternatywne ścieżki postępowania. W zetknięciu z każdą sytuacją mogą szybko rozpoznać odpowiednie wzory i problemy. Podziwiam osoby, które mają łatwość zauważenia dostępnych opcji oraz łatwość pójścia za którąś z nich – co wiąże się z umiejętnością odpuszczania, z intuicją, z łatwością zmiany. O tym jak działa to w praktyce, co sprawia, że ten talent jest dojrzały, kiedy widać jego ciemne strony, rozmawiam z Bartkiem Kolasą, Izabelą Marciniak oraz Sonią Zieleniewską. Zapraszam do poznania talentu Strateg! Intencjonalny newsletter Co tydzień wysyłam list, w którym zapraszam do rozmowy i zadania sobie ważnych pytań. Gościnie Bartosz Kolasa – zajmuje się inżynierią i tworzeniem oprogramowania. Implementuje sztuczną inteligencję do wykorzystania w rekrutacji. Tworzy społeczność Wrocław AI Team.Top 5: Współzależność, Aktywator, Rozwijanie Innych, Indywidualizacja, Strateg. Sonia Zieleniewska – zajmuje się marketingiem produktowym w branży IT. Pasjonuje się AI, tworzeniem procesów, optymalizacją i storytellingiem marketingowym. Dodatkowo jest makijażystką. Interesuje ją Human Design.Top 5: Aktywator, Odkrywczość, Odpowiedzialność, Strateg, CZAR.Instagram Iza Marciniak – zajmuje się zarządzaniem łańcuchem dostaw..Top 5: Strateg, Indywidualizacja, Osiąganie, Ukierunkowanie, Analityk. Linki Streszczenie Jak Stratega widzicie w codziennej pracy? Bartosz: W jednym z raportów była informacja, że Strateg to taki talent do optymalizacji. Czuję się spełniony, gdy wybieram […] The post #269 Słownik talentów – Strateg (Strategic) – drugi sezon appeared first on Near-Perfect Performance.
Zanim zaczniemy – zrób pierwszy krok! Osiągnij zdrowie i sprawne ciało – takie, które kochasz i które jest Twoje – z pomocą dietetyków online: www.dietetykanienazarty.plZapraszam na ważną i pełną autorefleksji rozmowę z lek. Alicją Baską – specjalistką medycyny stylu życia, lekarką, która mówi o zdrowiu nie tylko z poziomu nauki, ale też… zwyczajnego człowieczeństwa.W rozmowie pytamy m.in.:• Czy lekarze naprawdę żyją tak zdrowo, jak się wydaje?• Jakie „dziwactwa” mają eksperci od zdrowego stylu życia?• Czy lekarz może publicznie złamać zasadę, którą głosi w gabinecie?• Co czuje ekspertka, gdy nie daje rady być idealna?• Jak sobie radzić z presją, że trzeba być zawsze wzorem?
S.O.S. (Stories of Service) - Ordinary people who do extraordinary work
In this powerful and eye-opening conversation, decorated veteran and military justice reform advocate Adam DeRito takes us through his remarkable journey from Air Force Academy cadet to the frontlines of a battle few civilians understand: the fight against military retaliation.Adam's story begins with his post-9/11 commitment to service, arriving at the Air Force Academy with real-world experience as a firefighter and EMT. After becoming an OSI confidential informant reporting cadet misconduct, his life took a devastating turn when he experienced sexual assault off-campus—and faced dismissal rather than support from his command. What followed was a systematic campaign of retaliation culminating in falsified medical records dated after he'd already left the Academy, an illegal tactic designed to permanently block his military career.Despite these obstacles, Adam persevered through multiple administrative appeals, federal court battles, and political advocacy while continuing to serve in the National Guard and Army Reserves. His experiences led him to draft the Military Mental Health Protection and Justice Act (known informally as the "DeRito Act"), which would prevent commanders from weaponizing command-directed evaluations against service members who report misconduct.The conversation exposes critical gaps in military accountability where commanders operate with minimal oversight, creating a chilling effect that damages readiness and unit cohesion. Adam's documentation of his case—including medical records falsified by someone without proper licensing—reveals how military mental health evaluations can be weaponized to silence whistleblowers and assault survivors.For anyone concerned about veterans' rights, military readiness, or constitutional protections, this episode provides rare insight into how our military justice system actually operates and why reforms like the DeRito Act are desperately needed. Visit adamdorito.com to review the evidence and join the fight for accountability that affects thousands of service members.
W 366. lekcji świętujemy 7. urodziny podcastu. Podamy nieco statystyk, omówimy nasze ulubione odcinki, omówimy wyniki ankiety wśród słuchaczy, powiemy o sukcesach i wtopie oraz o planach na przyszłość.-----Rozdziały--------(0:09) - Intro(0:42) - Statystyki po 7 latach(5:08) - Ulubione odcinki(7:20) - Ankieta słuchaczy(10:27) - Osiągnięcia i wtopa(14:21) - Plany na przyszłość(18:24) - Outro----------------------Jeżeli doceniasz moją pracę nad podcastem, to zostań Patronem KNA dzięki stronie https://patronite.pl/kwadrans. Nie wiesz czym jest Patronite? Posłuchaj specjalnego odcinka: https://kwadransnaangielski.pl/wsparcieDołącz do naszej społeczności na stronie https://KwadransNaAngielski.plLekcji możesz słuchać na Spotify albo oglądać na YouTube.Wszystkie nowe wyrażenia z tej lekcji w formie pisemnej są dostępne na stronie https://kwadransnaangielski.pl/366#polskipodcast #kwadransnaangielski #angielski----------------------Mecenasi wśród Patronów:Joanna KwiatkowskaJoannaJakub Wiśniewski - https://bezpiecznyvpn.pl---------Utwór: Happy Birthday to You Classical by SergeQuadrado -- https://freesound.org/s/541177/ -- License: Attribution NonCommercial 3.0
Welcome to Episode 174 of Inside The Line: The Catskill Mountains Podcast! This week, we're joined by Tom Gravel, Senior Project Land Manager at the Open Space Institute, for an in-depth conversation about OSI's recent massive 3,100-acre acquisition on Blue Hill in the southern Catskills. We dig into what this means for conservation, recreation, and the future of public access in the region. We also take a look at the development plans for the former Black Bear Lodge, a bizarre case of hikers getting lost while tripping on mushrooms and a recent rescue on Blackhead Mountain. Whether you're here for land conservation talk, trail safety, or the weird stories the mountains always seem to offer—this episode has something for you. Make sure to subscribe on your favorite platform, share the show, donate if you feel like it… or just keep tuning in. I'm just grateful you're here. And as always... VOLUNTEER!!!!Links for the Podcast: https://linktr.ee/ISLCatskillsPodcast, Donate a coffee to support the show! https://www.buymeacoffee.com/ITLCatskills, Like to be a sponsor or monthly supporter of the show? Go here! - https://www.buymeacoffee.com/ITLCatskills/membershipThanks to the sponsors of the show: Outdoor chronicles photography - https://www.outdoorchroniclesphotography.com/, Trailbound Project - https://www.trailboundproject.com/, Camp Catskill - https://campcatskill.co/, Another Summit - https://www.guardianrevival.org/programs/another-summitLinks: Open Space Institutes, Trust for public land, DEC seeks public comments for forest growing,Volunteer Opportunities: Trailhead stewards for 3500 Club -https://www.catskill3500club.org/trailhead-stewardship, Catskills Trail Crew - https://www.nynjtc.org/trailcrew/catskills-trail-crew, NYNJTC Volunteering - https://www.nynjtc.org/catskills, Catskill Center - https://catskillcenter.org/, Catskill Mountain Club - https://catskillmountainclub.org/about-us/, Catskill Mountainkeeper - https://www.catskillmountainkeeper.org/, Bramley Mountain Fire Tower - https://bramleymountainfiretower.org/ Post Hike Brews and Bites - Sunshine Colony#OSI #bluehill #catskillhistory #hikehudson #hikethehudson #hudsonvalleyhiking #NYC #history #husdonvalley #hikingNY #kaaterskill #bluehole #catskillhiking #visitcatskills #catskillstrails #catskillmountains #catskillspodcast #catskills #catskillpark #catskillshiker #catskillmountainsnewyork #hiking #catskill3500club #catskill3500 #hikethecatskills
Episode 544 - Derrick Jackson - Shadow One - Air Force Office of Special Investigations, world of criminal investigations and counterintelligenceAbout the authorDerrick Jackson joined the U.S. Air Force and served as a jet engine specialist on the F-15 Eagle, C-5 Galaxy, C-141 Stratofortress and C-17 Globemaster. After 10 years of service, he was recruited to become a Special Agent with the Air Force Office of Special Investigations. His first assignments were as a criminal investigator at Tyndall AFB and Osan Airbase, Republic of Korea. He then volunteered to join OSI's Special Missions Branch at Hurlburt Field, FL to provide counterintelligence services for the Air Force Special Operations Command missions worldwide. After a brief stint at Bolling AFB, DC with the Protective Service Detachment, providing security for foreign dignitaries, Agent Jackson became the Chief of the Economic Crimes Branch at Joint Base Andrews. In 2014, Special Agent retired from the Air Force after 21 years of service.Book: Shadow One - Torn between the love of his life and his career, Air Force Staff Sergeant Devin Jackson is recruited to become a Special Agent with the Office of Special Investigations.When the Agents uncover an international human trafficking and drug smuggling ring, the crime syndicate decides to strike back; and soon the hunters become the prey. Once the pressure mounts, the team begins to crack and questions if one of their own has betrayed them. As Devin struggles to find balance between the disturbing reality of trafficking and his personal life; disaster strikes, and he fails to protect the person closest to him.Depression, self-doubt, and grief overcome him until an old friend arrives back on the scene and provides the healing he needs to seek revenge and bring the criminals to justice.https://a.co/d/hhTERZ2Support the show___https://livingthenextchapter.com/podcast produced by: https://truemediasolutions.ca/Coffee Refills are always appreciated, refill Dave's cup here, and thanks!https://buymeacoffee.com/truemediaca
In which Derrick talks about his new book, SHADOW ONE (and many of his experiences as an OSI agent that *aren't* in the book!).
While on a camping trip in an abandoned mining town just outside the Nellis Air Force Range, a husband and father of two was killed by a bizarre, bug-like being who had escaped from the S-2 Annex of the notorious Area-51. Following the escape, a pair of OSI officers were tasked with finding out how the mantis-like monstrosity had managed to get out and, more pressing still, what had become of it. The Cryptonaut Podcast Patreon:https://www.patreon.com/cryptonautpodcast The Cryptonaut Podcast Merch Stores:Hellorspace.com - Cryptonautmerch.com Stay Connected with the Cryptonaut Podcast: Website - Instagram - TikTok - YouTube- Twitter - Facebook
This week's guest on Control Intelligence is Patrick Bunn, owner of Bunn Automation Consulting in Birmingham, Alabama. Bunn's career has included valuable experience with CMC Steel Alabama, Revere Control Systems, EC&S, Hargrove Controls & Automation and Enercon, as well as his volunteer work with younger people in technology, engineering and automation. He will be one of the presenters at OT SCADA CON this July in Houston, where he'll be discussing industrial network protocols and how to use Wireshark software for troubleshooting, as well as the OSI model, which he wrote a very popular on for Control Design. He will speak at the event on July 24 at 3 p.m.
In this week's Listener Series episode of The Birth Trauma Mama Podcast, Scarlett bravely shares her story a layered, and still-unfolding journey through birth trauma, postpartum hemorrhage, and complex pelvic floor injuries that continue to impact her life more than five years later.She speaks candidly about the realities of:
Send us a textIn this epic Ones Ready episode, we sit down with Jay from Endex Archery, whose resume reads like a military fever dream: SERE drop, Security Forces, Combat Arms, OSI Agent, tier-one special mission unit… and then casually slides into the FBI. This man literally said “nah” to survival school and then sprinted straight into a career that landed him fighting terror, investigating spies, and now helping vets heal through archery.Jay opens up about losing six teammates to a VBIED in Afghanistan, how that tragedy turned into his life's mission, and why a bow and arrow saved his soul. We talk survivor's guilt, FBI hostage rescue, sneaky pull-up bars, and why he's built an organization to help other veterans shoot their way back into mental clarity. Also: hilarious stories about SERE instructors, Air Force recruiter lies, and the absolute dumpster fire that is military admin.If you've ever thought you couldn't pivot, couldn't overcome, or couldn't create something powerful out of pain—this episode is your proof otherwise.
Send us a textJust a quick hitter answering all your AFSPECWAR questionsIn this conversation, Aaron discusses various topics related to the Air Force, including the current state of the Air Force amidst budget cuts, the enduring demand for special operations forces, and the importance of military brotherhood. He reflects on a recent retirement event, shares thoughts on U.S. foreign policy obligations, and expresses gratitude for the community's support. The conversation also touches on future training initiatives, the special warfare pipeline, and interactions with the OSI, emphasizing the importance of collaboration and community engagement. In this conversation, Aaron discusses various aspects of military life, including the importance of engaging with local communities during deployments, the differences between enlisted personnel and officers, and the evolving nature of drone warfare. He shares insights on physical preparation, experiences with unidentified aerial phenomena, and the advancements in military technology. Additionally, he addresses changes in training pipelines and the considerations for age when enlisting in the military.TakeawaysThe Air Force is always evolving and adapting to changes.Special operations jobs will always be in demand due to their critical roles.Military brotherhood is a cherished aspect of service that many miss after retirement.The U.S. is not obligated to intervene in every foreign conflict.Community engagement and gratitude are vital for morale and support.Future training initiatives are being planned to better prepare candidates.Understanding the special warfare pipeline is crucial for aspiring candidates.Collaboration with OSI enhances mission effectiveness and safety.Everyone has a role to play in the military, regardless of their specific job.Open communication with the community is essential for growth and improvement. Engaging with local communities is crucial during deployments.There are significant differences between enlisted personnel and officers.The Air Force leads in drone warfare tactics and strategies.Physical preparation is essential for military readiness.Unidentified aerial phenomena can be perplexing and concerniSupport the showJoin this channel to get access to perks: HEREBuzzsprout Subscription page: HERECollabs:Ones Ready - OnesReady.com 18A Fitness - Promo Code: 1Ready ATACLete - Follow the URL (no promo code): ATACLeteCardoMax - Promo Code: ONESREADYDanger Close Apparel - Promo Code: ONESREADYDFND Apparel - Promo Code: ONESREADYHoist - Promo Code: ONESREADYKill Cliff - Pro...
Gros épisode qui couvre un large spectre de sujets : Java, Scala, Micronaut, NodeJS, l'IA et la compétence des développeurs, le sampling dans les LLMs, les DTO, le vibe coding, les changements chez Broadcom et Red Hat ainsi que plusieurs nouvelles sur les licences open source. Enregistré le 7 mai 2025 Téléchargement de l'épisode LesCastCodeurs-Episode-325.mp3 ou en vidéo sur YouTube. News Langages A l'occasion de JavaOne et du lancement de Java 24, Oracle lance un nouveau site avec des ressources vidéo pour apprendre le langage https://learn.java/ site plutôt à destination des débutants et des enseignants couvre la syntaxe aussi, y compris les ajouts plus récents comme les records ou le pattern matching c'est pas le site le plus trendy du monde. Martin Odersky partage un long article sur l'état de l'écosystème Scala et les évolutions du language https://www.scala-lang.org/blog/2025/03/24/evolving-scala.html Stabilité et besoin d'évolution : Scala maintient sa position (~14ème mondial) avec des bases techniques solides, mais doit évoluer face à la concurrence pour rester pertinent. Axes prioritaires : L'évolution se concentre sur l'amélioration du duo sécurité/convivialité, le polissage du langage (suppression des “rugosités”) et la simplification pour les débutants. Innovation continue : Geler les fonctionnalités est exclu ; l'innovation est clé pour la valeur de Scala. Le langage doit rester généraliste et ne pas se lier à un framework spécifique. Défis et progrès : L'outillage (IDE, outils de build comme sbt, scala-cli, Mill) et la facilité d'apprentissage de l'écosystème sont des points d'attention, avec des améliorations en cours (partenariat pédagogique, plateformes simples). Des strings encore plus rapides ! https://inside.java/2025/05/01/strings-just-got-faster/ Dans JDK 25, la performance de la fonction String::hashCode a été améliorée pour être principalement constant foldable. Cela signifie que si les chaînes de caractères sont utilisées comme clés dans une Map statique et immuable, des gains de performance significatifs sont probables. L'amélioration repose sur l'annotation interne @Stable appliquée au champ privé String.hash. Cette annotation permet à la machine virtuelle de lire la valeur du hash une seule fois et de la considérer comme constante si elle n'est pas la valeur par défaut (zéro). Par conséquent, l'opération String::hashCode peut être remplacée par la valeur de hash connue, optimisant ainsi les lookups dans les Map immuables. Un cas limite est celui où le code de hachage de la chaîne est zéro, auquel cas l'optimisation ne fonctionne pas (par exemple, pour la chaîne vide “”). Bien que l'annotation @Stable soit interne au JDK, un nouveau JEP (JEP 502: Stable Values (Preview)) est en cours de développement pour permettre aux utilisateurs de bénéficier indirectement de fonctionnalités similaires. AtomicHash, une implémentation Java d'une HashMap qui est thread-safe, atomique et non-bloquante https://github.com/arxila/atomichash implémenté sous forme de version immutable de Concurrent Hash Trie Librairies Sortie de Micronaut 4.8.0 https://micronaut.io/2025/04/01/micronaut-framework-4-8-0-released/ Mise à jour de la BOM (Bill of Materials) : La version 4.8.0 met à jour la BOM de la plateforme Micronaut. Améliorations de Micronaut Core : Intégration de Micronaut SourceGen pour la génération interne de métadonnées et d'expressions bytecode. Nombreuses améliorations dans Micronaut SourceGen. Ajout du traçage de l'injection de dépendances pour faciliter le débogage au démarrage et à la création des beans. Nouveau membre definitionType dans l'annotation @Client pour faciliter le partage d'interfaces entre client et serveur. Support de la fusion dans les Bean Mappers via l'annotation @Mapping. Nouvelle liveness probe détectant les threads bloqués (deadlocked) via ThreadMXBean. Intégration Kubernetes améliorée : Mise à jour du client Java Kubernetes vers la version 22.0.1. Ajout du module Micronaut Kubernetes Client OpenAPI, offrant une alternative au client officiel avec moins de dépendances, une configuration unifiée, le support des filtres et la compatibilité Native Image. Introduction d'un nouveau runtime serveur basé sur le serveur HTTP intégré de Java, permettant de créer des applications sans dépendances serveur externes. Ajout dans Micronaut Micrometer d'un module pour instrumenter les sources de données (traces et métriques). Ajout de la condition condition dans l'annotation @MetricOptions pour contrôler l'activation des métriques via une expression. Support des Consul watches dans Micronaut Discovery Client pour détecter les changements de configuration distribuée. Possibilité de générer du code source à partir d'un schéma JSON via les plugins de build (Gradle et Maven). Web Node v24.0.0 passe en version Current: https://nodejs.org/en/blog/release/v24.0.0 Mise à jour du moteur V8 vers la version 13.6 : intégration de nouvelles fonctionnalités JavaScript telles que Float16Array, la gestion explicite des ressources (using), RegExp.escape, WebAssembly Memory64 et Error.isError. npm 11 inclus : améliorations en termes de performance, de sécurité et de compatibilité avec les packages JavaScript modernes. Changement de compilateur pour Windows : abandon de MSVC au profit de ClangCL pour la compilation de Node.js sur Windows. AsyncLocalStorage utilise désormais AsyncContextFrame par défaut : offrant une gestion plus efficace du contexte asynchrone. URLPattern disponible globalement : plus besoin d'importer explicitement cette API pour effectuer des correspondances d'URL. Améliorations du modèle de permissions : le flag expérimental --experimental-permission devient --permission, signalant une stabilité accrue de cette fonctionnalité. Améliorations du test runner : les sous-tests sont désormais attendus automatiquement, simplifiant l'écriture des tests et réduisant les erreurs liées aux promesses non gérées. Intégration d'Undici 7 : amélioration des capacités du client HTTP avec de meilleures performances et un support étendu des fonctionnalités HTTP modernes. Dépréciations et suppressions : Dépréciation de url.parse() au profit de l'API WHATWG URL. Suppression de tls.createSecurePair. Dépréciation de SlowBuffer. Dépréciation de l'instanciation de REPL sans new. Dépréciation de l'utilisation des classes Zlib sans new. Dépréciation du passage de args à spawn et execFile dans child_process. Node.js 24 est actuellement la version “Current” et deviendra une version LTS en octobre 2025. Il est recommandé de tester cette version pour évaluer son impact sur vos applications. Data et Intelligence Artificielle Apprendre à coder reste crucial et l'IA est là pour venir en aide : https://kyrylo.org/software/2025/03/27/learn-to-code-ignore-ai-then-use-ai-to-code-even-better.html Apprendre à coder reste essentiel malgré l'IA. L'IA peut assister la programmation. Une solide base est cruciale pour comprendre et contrôler le code. Cela permet d'éviter la dépendance à l'IA. Cela réduit le risque de remplacement par des outils d'IA accessibles à tous. L'IA est un outil, pas un substitut à la maîtrise des fondamentaux. Super article de Anthropic qui essaie de comprendre comment fonctionne la “pensée” des LLMs https://www.anthropic.com/research/tracing-thoughts-language-model Effet boîte noire : Stratégies internes des IA (Claude) opaques aux développeurs et utilisateurs. Objectif : Comprendre le “raisonnement” interne pour vérifier capacités et intentions. Méthode : Inspiration neurosciences, développement d'un “microscope IA” (regarder quels circuits neuronaux s'activent). Technique : Identification de concepts (“features”) et de “circuits” internes. Multilinguisme : Indice d'un “langage de pensée” conceptuel commun à toutes les langues avant de traduire dans une langue particulière. Planification : Capacité à anticiper (ex: rimes en poésie), pas seulement de la génération mot par mot (token par token). Raisonnement non fidèle : Peut fabriquer des arguments plausibles (“bullshitting”) pour une conclusion donnée. Logique multi-étapes : Combine des faits distincts, ne se contente pas de mémoriser. Hallucinations : Refus par défaut ; réponse si “connaissance” active, sinon risque d'hallucination si erreur. “Jailbreaks” : Tension entre cohérence grammaticale (pousse à continuer) et sécurité (devrait refuser). Bilan : Méthodes limitées mais prometteuses pour la transparence et la fiabilité de l'IA. Le “S” dans MCP veut dire Securité (ou pas !) https://elenacross7.medium.com/%EF%B8%8F-the-s-in-mcp-stands-for-security-91407b33ed6b La spécification MCP pour permettre aux LLMs d'avoir accès à divers outils et fonctions a peut-être été adoptée un peu rapidement, alors qu'elle n'était pas encore prête niveau sécurité L'article liste 4 types d'attaques possibles : vulnérabilité d'injection de commandes attaque d'empoisonnement d'outils redéfinition silencieuse de l'outil le shadowing d'outils inter-serveurs Pour l'instant, MCP n'est pas sécurisé : Pas de standard d'authentification Pas de chiffrement de contexte Pas de vérification d'intégrité des outils Basé sur l'article de InvariantLabs https://invariantlabs.ai/blog/mcp-security-notification-tool-poisoning-attacks Sortie Infinispan 15.2 - pre rolling upgrades 16.0 https://infinispan.org/blog/2025/03/27/infinispan-15-2 Support de Redis JSON + scripts Lua Métriques JVM désactivables Nouvelle console (PatternFly 6) Docs améliorées (métriques + logs) JDK 17 min, support JDK 24 Fin du serveur natif (performances) Guillaume montre comment développer un serveur MCP HTTP Server Sent Events avec l'implémentation de référence Java et LangChain4j https://glaforge.dev/posts/2025/04/04/mcp-client-and-server-with-java-mcp-sdk-and-langchain4j/ Développé en Java, avec l'implémentation de référence qui est aussi à la base de l'implémentation dans Spring Boot (mais indépendant de Spring) Le serveur MCP est exposé sous forme de servlet dans Jetty Le client MCP lui, est développé avec le module MCP de LangChain4j c'est semi independant de Spring dans le sens où c'est dépendant de Reactor et de ses interface. il y a une conversation sur le github d'anthropic pour trouver une solution, mais cela ne parait pas simple. Les fallacies derrière la citation “AI won't replace you, but humans using AI will” https://platforms.substack.com/cp/161356485 La fallacie de l'automatisation vs. l'augmentation : Elle se concentre sur l'amélioration des tâches existantes avec l'IA au lieu de considérer le changement de la valeur de ces tâches dans un nouveau système. La fallacie des gains de productivité : L'augmentation de la productivité ne se traduit pas toujours par plus de valeur pour les travailleurs, car la valeur créée peut être capturée ailleurs dans le système. La fallacie des emplois statiques : Les emplois sont des constructions organisationnelles qui peuvent être redéfinies par l'IA, rendant les rôles traditionnels obsolètes. La fallacie de la compétition “moi vs. quelqu'un utilisant l'IA” : La concurrence évolue lorsque l'IA modifie les contraintes fondamentales d'un secteur, rendant les compétences existantes moins pertinentes. La fallacie de la continuité du flux de travail : L'IA peut entraîner une réimagination complète des flux de travail, éliminant le besoin de certaines compétences. La fallacie des outils neutres : Les outils d'IA ne sont pas neutres et peuvent redistribuer le pouvoir organisationnel en changeant la façon dont les décisions sont prises et exécutées. La fallacie du salaire stable : Le maintien d'un emploi ne garantit pas un salaire stable, car la valeur du travail peut diminuer avec l'augmentation des capacités de l'IA. La fallacie de l'entreprise stable : L'intégration de l'IA nécessite une restructuration de l'entreprise et ne se fait pas dans un vide organisationnel. Comprendre le “sampling” dans les LLMs https://rentry.co/samplers Explique pourquoi les LLMs utilisent des tokens Les différentes méthodes de “sampling” : càd de choix de tokens Les hyperparamètres comme la température, top-p, et leur influence réciproque Les algorithmes de tokenisation comme Byte Pair Encoding et SentencePiece. Un de moins … OpenAI va racheter Windsurf pour 3 milliards de dollars. https://www.bloomberg.com/news/articles/2025-05-06/openai-reaches-agreement-to-buy-startup-windsurf-for-3-billion l'accord n'est pas encore finalisé Windsurf était valorisé à 1,25 milliards l'an dernier et OpenAI a levé 40 milliards dernièrement portant sa valeur à 300 milliards Le but pour OpenAI est de rentrer dans le monde des assistants de code pour lesquels ils sont aujourd'hui absent Docker desktop se met à l'IA… ? Une nouvelle fonctionnalité dans docker desktop 4.4 sur macos: Docker Model Runner https://dev.to/docker/run-genai-models-locally-with-docker-model-runner-5elb Permet de faire tourner des modèles nativement en local ( https://docs.docker.com/model-runner/ ) mais aussi des serveurs MCP ( https://docs.docker.com/ai/mcp-catalog-and-toolkit/ ) Outillage Jetbrains défend la suppression des commentaires négatifs sur son assistant IA https://devclass.com/2025/04/30/jetbrains-defends-removal-of-negative-reviews-for-unpopular-ai-assistant/?td=rt-3a L'IA Assistant de JetBrains, lancée en juillet 2023, a été téléchargée plus de 22 millions de fois mais n'est notée que 2,3 sur 5. Des utilisateurs ont remarqué que certaines critiques négatives étaient supprimées, ce qui a provoqué une réaction négative sur les réseaux sociaux. Un employé de JetBrains a expliqué que les critiques ont été supprimées soit parce qu'elles mentionnaient des problèmes déjà résolus, soit parce qu'elles violaient leur politique concernant les “grossièretés, etc.” L'entreprise a reconnu qu'elle aurait pu mieux gérer la situation, un représentant déclarant : “Supprimer plusieurs critiques d'un coup sans préavis semblait suspect. Nous aurions dû au moins publier un avis et fournir plus de détails aux auteurs.” Parmi les problèmes de l'IA Assistant signalés par les utilisateurs figurent : un support limité pour les fournisseurs de modèles tiers, une latence notable, des ralentissements fréquents, des fonctionnalités principales verrouillées aux services cloud de JetBrains, une expérience utilisateur incohérente et une documentation insuffisante. Une plainte courante est que l'IA Assistant s'installe sans permission. Un utilisateur sur Reddit l'a qualifié de “plugin agaçant qui s'auto-répare/se réinstalle comme un phénix”. JetBrains a récemment introduit un niveau gratuit et un nouvel agent IA appelé Junie, destiné à fonctionner parallèlement à l'IA Assistant, probablement en réponse à la concurrence entre fournisseurs. Mais il est plus char a faire tourner. La société s'est engagée à explorer de nouvelles approches pour traiter les mises à jour majeures différemment et envisage d'implémenter des critiques par version ou de marquer les critiques comme “Résolues” avec des liens vers les problèmes correspondants au lieu de les supprimer. Contrairement à des concurrents comme Microsoft, AWS ou Google, JetBrains commercialise uniquement des outils et services de développement et ne dispose pas d'une activité cloud distincte sur laquelle s'appuyer. Vos images de README et fichiers Markdown compatibles pour le dark mode de GitHub: https://github.blog/developer-skills/github/how-to-make-your-images-in-markdown-on-github-adjust-for-dark-mode-and-light-mode/ Seulement quelques lignes de pure HTML pour le faire Architecture Alors, les DTOs, c'est bien ou c'est pas bien ? https://codeopinion.com/dtos-mapping-the-good-the-bad-and-the-excessive/ Utilité des DTOs : Les DTOs servent à transférer des données entre les différentes couches d'une application, en mappant souvent les données entre différentes représentations (par exemple, entre la base de données et l'interface utilisateur). Surutilisation fréquente : L'article souligne que les DTOs sont souvent utilisés de manière excessive, notamment pour créer des API HTTP qui ne font que refléter les entités de la base de données, manquant ainsi l'opportunité de composer des données plus riches. Vraie valeur : La valeur réelle des DTOs réside dans la gestion du couplage entre les couches et la composition de données provenant de sources multiples en formes optimisées pour des cas d'utilisation spécifiques. Découplage : Il est suggéré d'utiliser les DTOs pour découpler les modèles de données internes des contrats externes (comme les API), ce qui permet une évolution et une gestion des versions indépendantes. Exemple avec CQRS : Dans le cadre de CQRS (Command Query Responsibility Segregation), les réponses aux requêtes (queries) agissent comme des DTOs spécifiquement adaptés aux besoins de l'interface utilisateur, pouvant inclure des données de diverses sources. Protection des données internes : Les DTOs aident à distinguer et protéger les modèles de données internes (privés) des changements externes (publics). Éviter l'excès : L'auteur met en garde contre les couches de mapping excessives (mapper un DTO vers un autre DTO) qui n'apportent pas de valeur ajoutée. Création ciblée : Il est conseillé de ne créer des DTOs que lorsqu'ils résolvent des problèmes concrets, tels que la gestion du couplage ou la facilitation de la composition de données. Méthodologies Même Guillaume se met au “vibe coding” https://glaforge.dev/posts/2025/05/02/vibe-coding-an-mcp-server-with-micronaut-and-gemini/ Selon Andrey Karpathy, c'est le fait de POC-er un proto, une appli jetable du weekend https://x.com/karpathy/status/1886192184808149383 Mais Simon Willison s'insurge que certains confondent coder avec l'assistance de l'IA avec le vibe coding https://simonwillison.net/2025/May/1/not-vibe-coding/ Guillaume c'est ici amusé à développer un serveur MCP avec Micronaut, en utilisant Gemini, l'IA de Google. Contrairement à Quarkus ou Spring Boot, Micronaut n'a pas encore de module ou de support spécifique pour faciliter la création de serveur MCP Sécurité Une faille de sécurité 10/10 sur Tomcat https://www.it-connect.fr/apache-tomcat-cette-faille-activement-exploitee-seulement-30-heures-apres-sa-divulgation-patchez/ Une faille de sécurité critique (CVE-2025-24813) affecte Apache Tomcat, permettant l'exécution de code à distance Cette vulnérabilité est activement exploitée seulement 30 heures après sa divulgation du 10 mars 2025 L'attaque ne nécessite aucune authentification et est particulièrement simple à exécuter Elle utilise une requête PUT avec une charge utile Java sérialisée encodée en base64, suivie d'une requête GET L'encodage en base64 permet de contourner la plupart des filtres de sécurité Les serveurs vulnérables utilisent un stockage de session basé sur des fichiers (configuration répandue) Les versions affectées sont : 11.0.0-M1 à 11.0.2, 10.1.0-M1 à 10.1.34, et 9.0.0.M1 à 9.0.98 Les mises à jour recommandées sont : 11.0.3+, 10.1.35+ et 9.0.99+ Les experts prévoient des attaques plus sophistiquées dans les prochaines phases d'exploitation (upload de config ou jsp) Sécurisation d'un serveur ssh https://ittavern.com/ssh-server-hardening/ un article qui liste les configurations clés pour sécuriser un serveur SSH par exemple, enlever password authentigfication, changer de port, desactiver le login root, forcer le protocol ssh 2, certains que je ne connaissais pas comme MaxStartups qui limite le nombre de connections non authentifiées concurrentes Port knocking est une technique utile mais demande une approche cliente consciente du protocol Oracle admet que les identités IAM de ses clients ont leaké https://www.theregister.com/2025/04/08/oracle_cloud_compromised/ Oracle a confirmé à certains clients que son cloud public a été compromis, alors que l'entreprise avait précédemment nié toute intrusion. Un pirate informatique a revendiqué avoir piraté deux serveurs d'authentification d'Oracle et volé environ six millions d'enregistrements, incluant des clés de sécurité privées, des identifiants chiffrés et des entrées LDAP. La faille exploitée serait la vulnérabilité CVE-2021-35587 dans Oracle Access Manager, qu'Oracle n'avait pas corrigée sur ses propres systèmes. Le pirate a créé un fichier texte début mars sur login.us2.oraclecloud.com contenant son adresse email pour prouver son accès. Selon Oracle, un ancien serveur contenant des données vieilles de huit ans aurait été compromis, mais un client affirme que des données de connexion aussi récentes que 2024 ont été dérobées. Oracle fait face à un procès au Texas concernant cette violation de données. Cette intrusion est distincte d'une autre attaque contre Oracle Health, sur laquelle l'entreprise refuse de commenter. Oracle pourrait faire face à des sanctions sous le RGPD européen qui exige la notification des parties affectées dans les 72 heures suivant la découverte d'une fuite de données. Le comportement d'Oracle consistant à nier puis à admettre discrètement l'intrusion est inhabituel en 2025 et pourrait mener à d'autres actions en justice collectives. Une GitHub action très populaire compromise https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised Compromission de l'action tj-actions/changed-files : En mars 2025, une action GitHub très utilisée (tj-actions/changed-files) a été compromise. Des versions modifiées de l'action ont exposé des secrets CI/CD dans les logs de build. Méthode d'attaque : Un PAT compromis a permis de rediriger plusieurs tags de version vers un commit contenant du code malveillant. Détails du code malveillant : Le code injecté exécutait une fonction Node.js encodée en base64, qui téléchargeait un script Python. Ce script parcourait la mémoire du runner GitHub à la recherche de secrets (tokens, clés…) et les exposait dans les logs. Dans certains cas, les données étaient aussi envoyées via une requête réseau. Période d'exposition : Les versions compromises étaient actives entre le 12 et le 15 mars 2025. Tout dépôt, particulièrement ceux publiques, ayant utilisé l'action pendant cette période doit être considéré comme potentiellement exposé. Détection : L'activité malveillante a été repérée par l'analyse des comportements inhabituels pendant l'exécution des workflows, comme des connexions réseau inattendues. Réaction : GitHub a supprimé l'action compromise, qui a ensuite été nettoyée. Impact potentiel : Tous les secrets apparaissant dans les logs doivent être considérés comme compromis, même dans les dépôts privés, et régénérés sans délai. Loi, société et organisation Les startup the YCombinateur ont les plus fortes croissances de leur histoire https://www.cnbc.com/2025/03/15/y-combinator-startups-are-fastest-growing-in-fund-history-because-of-ai.html Les entreprises en phase de démarrage à Silicon Valley connaissent une croissance significative grâce à l'intelligence artificielle. Le PDG de Y Combinator, Garry Tan, affirme que l'ensemble des startups de la dernière cohorte a connu une croissance hebdomadaire de 10% pendant neuf mois. L'IA permet aux développeurs d'automatiser des tâches répétitives et de générer du code grâce aux grands modèles de langage. Pour environ 25% des startups actuelles de YC, 95% de leur code a été écrit par l'IA. Cette révolution permet aux entreprises de se développer avec moins de personnel - certaines atteignant 10 millions de dollars de revenus avec moins de 10 employés. La mentalité de “croissance à tout prix” a été remplacée par un renouveau d'intérêt pour la rentabilité. Environ 80% des entreprises présentées lors du “demo day” étaient centrées sur l'IA, avec quelques startups en robotique et semi-conducteurs. Y Combinator investit 500 000 dollars dans les startups en échange d'une participation au capital, suivi d'un programme de trois mois. Red Hat middleware (ex-jboss) rejoint IBM https://markclittle.blogspot.com/2025/03/red-hat-middleware-moving-to-ibm.html Les activités Middleware de Red Hat (incluant JBoss, Quarkus, etc.) vont être transférées vers IBM, dans l'unité dédiée à la sécurité des données, à l'IAM et aux runtimes. Ce changement découle d'une décision stratégique de Red Hat de se concentrer davantage sur le cloud hybride et l'intelligence artificielle. Mark Little explique que ce transfert était devenu inévitable, Red Hat ayant réduit ses investissements dans le Middleware ces dernières années. L'intégration vise à renforcer l'innovation autour de Java en réunissant les efforts de Red Hat et IBM sur ce sujet. Les produits Middleware resteront open source et les clients continueront à bénéficier du support habituel sans changement. Mark Little affirme que des projets comme Quarkus continueront à être soutenus et que cette évolution est bénéfique pour la communauté Java. Un an de commonhaus https://www.commonhaus.org/activity/253.html un an, démarré sur les communautés qu'ils connaissaient bien maintenant 14 projets et put en accepter plus confiance, gouvernance legère et proteger le futur des projets automatisation de l'administratif, stabiilité sans complexité, les developpeurs au centre du processus de décision ils ont besoins de members et supporters (financiers) ils veulent accueillir des projets au delà de ceux du cercles des Java Champions Spring Cloud Data Flow devient un produit commercial et ne sera plus maintenu en open source https://spring.io/blog/2025/04/21/spring-cloud-data-flow-commercial Peut-être sous l'influence de Broadcom, Spring se met à mettre en mode propriétaire des composants du portefeuille Spring ils disent que peu de gens l'utilisaent en mode OSS et la majorité venait d'un usage dans la plateforme Tanzu Maintenir en open source le coutent du temps qu'ils son't pas sur ces projets. La CNCF protège le projet NATS, dans la fondation depuis 2018, vu que la société Synadia qui y contribue souhaitait reprendre le contrôle du projet https://www.cncf.io/blog/2025/04/24/protecting-nats-and-the-integrity-of-open-source-cncfs-commitment-to-the-community/ CNCF : Protège projets OS, gouvernance neutre. Synadia vs CNCF : Veut retirer NATS, licence non-OS (BUSL). CNCF : Accuse Synadia de “claw back” (reprise illégitime). Revendications Synadia : Domaine nats.io, orga GitHub. Marque NATS : Synadia n'a pas transféré (promesse rompue malgré aide CNCF). Contestation Synadia : Juge règles CNCF “trop vagues”. Vote interne : Mainteneurs Synadia votent sortie CNCF (sans communauté). Support CNCF : Investissement majeur ($ audits, légal), succès communautaire (>700 orgs). Avenir NATS (CNCF) : Maintien sous Apache 2.0, gouvernance ouverte. Actions CNCF : Health check, appel mainteneurs, annulation marque Synadia, rejet demandes. Mais finalement il semble y avoir un bon dénouement : https://www.cncf.io/announcements/2025/05/01/cncf-and-synadia-align-on-securing-the-future-of-the-nats-io-project/ Accord pour l'avenir de NATS.io : La Cloud Native Computing Foundation (CNCF) et Synadia ont conclu un accord pour sécuriser le futur du projet NATS.io. Transfert des marques NATS : Synadia va céder ses deux enregistrements de marque NATS à la Linux Foundation afin de renforcer la gouvernance ouverte du projet. Maintien au sein de la CNCF : L'infrastructure et les actifs du projet NATS resteront sous l'égide de la CNCF, garantissant ainsi sa stabilité à long terme et son développement en open source sous licence Apache-2.0. Reconnaissance et engagement : La Linux Foundation, par la voix de Todd Moore, reconnaît les contributions de Synadia et son soutien continu. Derek Collison, PDG de Synadia, réaffirme l'engagement de son entreprise envers NATS et la collaboration avec la Linux Foundation et la CNCF. Adoption et soutien communautaire : NATS est largement adopté et considéré comme une infrastructure critique. Il bénéficie d'un fort soutien de la communauté pour sa nature open source et l'implication continue de Synadia. Finalement, Redis revient vers une licence open source OSI, avec la AGPL https://foojay.io/today/redis-is-now-available-under-the-agplv3-open-source-license/ Redis passe à la licence open source AGPLv3 pour contrer l'exploitation par les fournisseurs cloud sans contribution. Le passage précédent à la licence SSPL avait nui à la relation avec la communauté open source. Salvatore Sanfilippo (antirez) est revenu chez Redis. Redis 8 adopte la licence AGPL, intègre les fonctionnalités de Redis Stack (JSON, Time Series, etc.) et introduit les “vector sets” (le support de calcul vectoriel développé par Salvatore). Ces changements visent à renforcer Redis en tant que plateforme appréciée des développeurs, conformément à la vision initiale de Salvatore. Conférences La liste des conférences provenant de Developers Conferences Agenda/List par Aurélie Vache et contributeurs : 6-7 mai 2025 : GOSIM AI Paris - Paris (France) 7-9 mai 2025 : Devoxx UK - London (UK) 15 mai 2025 : Cloud Toulouse - Toulouse (France) 16 mai 2025 : AFUP Day 2025 Lille - Lille (France) 16 mai 2025 : AFUP Day 2025 Lyon - Lyon (France) 16 mai 2025 : AFUP Day 2025 Poitiers - Poitiers (France) 22-23 mai 2025 : Flupa UX Days 2025 - Paris (France) 24 mai 2025 : Polycloud - Montpellier (France) 24 mai 2025 : NG Baguette Conf 2025 - Nantes (France) 3 juin 2025 : TechReady - Nantes (France) 5-6 juin 2025 : AlpesCraft - Grenoble (France) 5-6 juin 2025 : Devquest 2025 - Niort (France) 10-11 juin 2025 : Modern Workplace Conference Paris 2025 - Paris (France) 11-13 juin 2025 : Devoxx Poland - Krakow (Poland) 12 juin 2025 : Positive Design Days - Strasbourg (France) 12-13 juin 2025 : Agile Tour Toulouse - Toulouse (France) 12-13 juin 2025 : DevLille - Lille (France) 13 juin 2025 : Tech F'Est 2025 - Nancy (France) 17 juin 2025 : Mobilis In Mobile - Nantes (France) 19-21 juin 2025 : Drupal Barcamp Perpignan 2025 - Perpignan (France) 24 juin 2025 : WAX 2025 - Aix-en-Provence (France) 25-26 juin 2025 : Agi'Lille 2025 - Lille (France) 25-27 juin 2025 : BreizhCamp 2025 - Rennes (France) 26-27 juin 2025 : Sunny Tech - Montpellier (France) 1-4 juillet 2025 : Open edX Conference - 2025 - Palaiseau (France) 7-9 juillet 2025 : Riviera DEV 2025 - Sophia Antipolis (France) 5 septembre 2025 : JUG Summer Camp 2025 - La Rochelle (France) 12 septembre 2025 : Agile Pays Basque 2025 - Bidart (France) 18-19 septembre 2025 : API Platform Conference - Lille (France) & Online 23 septembre 2025 : OWASP AppSec France 2025 - Paris (France) 25-26 septembre 2025 : Paris Web 2025 - Paris (France) 2-3 octobre 2025 : Volcamp - Clermont-Ferrand (France) 3 octobre 2025 : DevFest Perros-Guirec 2025 - Perros-Guirec (France) 6-10 octobre 2025 : Devoxx Belgium - Antwerp (Belgium) 7 octobre 2025 : BSides Mulhouse - Mulhouse (France) 9-10 octobre 2025 : Forum PHP 2025 - Marne-la-Vallée (France) 9-10 octobre 2025 : EuroRust 2025 - Paris (France) 16 octobre 2025 : PlatformCon25 Live Day Paris - Paris (France) 16-17 octobre 2025 : DevFest Nantes - Nantes (France) 30-31 octobre 2025 : Agile Tour Bordeaux 2025 - Bordeaux (France) 30-31 octobre 2025 : Agile Tour Nantais 2025 - Nantes (France) 30 octobre 2025-2 novembre 2025 : PyConFR 2025 - Lyon (France) 4-7 novembre 2025 : NewCrafts 2025 - Paris (France) 6 novembre 2025 : dotAI 2025 - Paris (France) 7 novembre 2025 : BDX I/O - Bordeaux (France) 12-14 novembre 2025 : Devoxx Morocco - Marrakech (Morocco) 13 novembre 2025 : DevFest Toulouse - Toulouse (France) 15-16 novembre 2025 : Capitole du Libre - Toulouse (France) 20 novembre 2025 : OVHcloud Summit - Paris (France) 21 novembre 2025 : DevFest Paris 2025 - Paris (France) 27 novembre 2025 : Devfest Strasbourg 2025 - Strasbourg (France) 28 novembre 2025 : DevFest Lyon - Lyon (France) 5 décembre 2025 : DevFest Dijon 2025 - Dijon (France) 10-11 décembre 2025 : Devops REX - Paris (France) 10-11 décembre 2025 : Open Source Experience - Paris (France) 28-31 janvier 2026 : SnowCamp 2026 - Grenoble (France) 2-6 février 2026 : Web Days Convention - Aix-en-Provence (France) 23-25 avril 2026 : Devoxx Greece - Athens (Greece) 17 juin 2026 : Devoxx Poland - Krakow (Poland) Nous contacter Pour réagir à cet épisode, venez discuter sur le groupe Google https://groups.google.com/group/lescastcodeurs Contactez-nous via X/twitter https://twitter.com/lescastcodeurs ou Bluesky https://bsky.app/profile/lescastcodeurs.com Faire un crowdcast ou une crowdquestion Soutenez Les Cast Codeurs sur Patreon https://www.patreon.com/LesCastCodeurs Tous les épisodes et toutes les infos sur https://lescastcodeurs.com/
There are 1,696 active players in the NFL. Just 138 are African. But if it were up to Osi Umenyiora, 11-year veteran and 2-time Super Bowl Champion, there would be many more. Osi is the Founder of The Uprise, the NFL's lead in Africa, and he's pioneering American football on the African continent. At the NFL's camp in Lagos, Nigeria, young athletes are vying for a shot to join the NFL Academy in London or to go straight to the League through the International Player Pathway Program. But many of them have never played American football before. So why is the NFL hosting camps in Africa? Is there really any shot of these players making it to the NFL?00:00 - The NFL is in Lagos, Nigeria00:30 - Osi Umenyiora is bringing football to Africa02:05 - The NFL wants the best talent in the world03:55 - Creating opportunities for African talentOur Links -
Send us a textDerek Jackson shares his journey from Air Force jet engine mechanic to OSI special agent, revealing the intense personal and professional challenges of federal law enforcement, and how these experiences inspired his crime thriller novel "Shadow One."• Starting as an enlisted jet engine mechanic before getting recruited to OSI• Discussing the reality of FLETC (Federal Law Enforcement Training Center) and the demanding training process• Transitioning from mechanic to criminal investigator and the mental shift required• Balancing investigative work with personal life and relationships• Using music to inspire creative writing and developing characters• Exploring how traumatic cases affect agents psychologically• Turning real-life experiences into a crime thriller novel• Finding the courage to follow your own path despite others' doubtsFind Derek Jackson's book "Shadow One" on Amazon, Barnes & Noble, Books A Million, and Walmart online.Support the showMake sure to check out Jason on IG @drjasonpiccolo
Każdy i każda z nas styka się z produktami. I każdy produkt jest w jakiś sposób zaprojektowany. Kto to robi i na czym polega ta rola? O różnicy w pracy właściciela produktu (Product Owner), menedżera produktu (Product Manager) oraz kierownika projektu (Project Manager) rozmawiam z Natalią Cholewą. Ciekawie było usłyszeć o jasnych stronach tej pracy, ale też o wyzwaniach. Natalia wspiera właścicieli produktów. Otwarcie rozmawialiśmy o tym jak to jest pracować nad produktem. Zapraszam do słuchania i rozmowy! Gościni Natalia Cholewa – mama, żona, córka, przyjaciółka, zawodowo jest produktowcem.Top 5: Osiąganie, Ukierunkowanie, Dyscyplina, Bezstronność, BliskośćInstagram Intencjonalny newsletter Co tydzień wysyłam list, w którym zapraszam do rozmowy i zadania sobie ważnych pytań. Linki Streszczenie Kim jest Product Owner? Dominik: Zacznijmy od podstaw – jak myślisz o poszczególnych rolach? Natalia: W Polsce są one trochę wypaczone. W ogłoszeniach o pracę zamiennie stosuje się nazwy Product Owner, Analityk Biznesowy, a nawet Product Manager. Wszystkie te role zajmują się zaspokajaniem potrzeb biznesowych, jakkolwiek by one nie były zdefiniowane. Analityk Biznesowy jest bliżej zespołu niż Product Owner – jeśli obie te role funkcjonują w firmie. Product Owner decyduje o kierunkach rozwoju produktu. Product Manager to osoba, która stawia rozwój produktu na pierwszym miejscu – wyznacza […] The post #259 Czy każdy produkt ma osobę, która się nim opiekuje? Rozmowa z Natalią Cholewą. appeared first on Near-Perfect Performance.
On the podcast today we have Robert Jacobi and he's here to talk about his tech journey, and his role at Black Wall, formerly BotGuard. We talk about the OSI model, explaining how computer networks communicate through seven layers, from application to physical. Robert shares insights into Black Wall's focus on preventing bot attacks at a layer far from the website, mitigating risks before they hit the hosting company. There's also a brief discussion of WordPress plugins and the complexity of online security, with a nod to the hope of increasing listeners' understanding of these intricate processes. If you've ever wondered about the unseen layers of internet security and infrastructure, or the strategic moves involved in rebranding a tech company, this episode is for you.
I'm joined by Derrick Jackson to discuss his 21 year career as an aircraft maintainer and OSI Special Agent. Derrick has authored his first novel Shadow One loosely based on his career. Derrick and I discuss myths around OSI, human trafficking in South Korea and the impacts on security clearance, counter-intelligence, and crime.
On today's N Is For Networking, we explore the fundamentals of routing, focusing on layer 3 of the OSI model. We explain the concepts of routers, routing tables, and routing protocols, and discuss why it’s important to have a firm grasp of these concepts before you tackle advanced topics such as VXLAN and EVPN. Today's... Read more »
On today's N Is For Networking, we explore the fundamentals of routing, focusing on layer 3 of the OSI model. We explain the concepts of routers, routing tables, and routing protocols, and discuss why it’s important to have a firm grasp of these concepts before you tackle advanced topics such as VXLAN and EVPN. Today's... Read more »
Deb Bryant discusses her career journey and the significant role of open source software in public policy, particularly in the US and Europe. She highlights her work with the Open Source Initiative, Oregon State University, and Red Hat, emphasizing the importance of open source in government operations and cybersecurity. Deb also addresses the challenges and evolution of open source policies, the critical need for sustainability in open source projects, and her current focus on AI's impact on the ecosystem. She concludes by advocating for harmonized international regulations and human-centered AI approaches. 00:00 Introduction 00:44 Government and Open Source Software 01:38 Experiences in the Private Sector 02:14 Open Source in Public Policy 04:31 Cybersecurity and Open Source 07:42 Sustainability in Open Source 15:05 Future of Open Source and AI 18:53 Conclusion and Final Thoughts Guest: Deb Bryant, Director, US Policy and Founder, Open Policy Alliance Open Source Initiative Throughout her career, Deborah has lent her voice to supporting open source projects and developers, building bridges between academia, industry, non-profits, and government along the way. Today she provides guidance to open source foundations seeking to support public policy development in open technology domains. She has worked in emerging technology and has been an advocate of free and open source software and the community that makes it so since the 1990s. Deborah is board director emeritus at the Open Source Initiative (OSI); serves on the DemocracyLab board; serves on the advisory boards of Open Source Elections Technology Foundation and the OASIS Open Project, and as an advisor to the Brandeis University Open Technology Management program. She also represents OSI as a member of the Digital Public Goods Alliance. For eight years prior to her reentry into the nonprofit world, she led one of the world's largest open source program offices (OSPO) at Red Hat where her global team was responsible for the company's strategy and stewardship in open source software communities. While at Red Hat she served on the Eclipse Foundation board for two years. Deborah's published academic research includes the Use of Open Source in Cybersecurity in the Energy Industry and Collaborative Models for Creating Software in the Public Sector.
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastIn this episode of Cyber Work Hacks, Infosec Boot Camp Instructor Tommy Gober walks us through what his Network+ training course is like. He talks about the supportive learning environment and explains how the boot camp is designed for those new to the field. He covers the structure of the five-day program, touching on topics like the OSI model, binary number systems, networking hardware and more. He also shares his insights on the benefits of boot camp learning versus self-study or traditional schooling — and offers tips for taking the Network+ exam. 0:00 Introduction 1:19 Free cybersecurity salary guide2:54 Boot camp training vs. other learning methods4:23 In-person and online boot camp experience9:13 Network+ boot camp daily breakdown11:56 Network+ exam preparation and testing strategies14:55 Final thoughts and wrap up– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
This episode highlights Ethernet's essential role in smart manufacturing, emphasizing its reliability, scalability, and interoperability as key components of modern industrial connectivity. Listeners will gain insights into Ethernet's network levels, topologies, and the importance of choosing the right communication protocol for their manufacturing needs.• Ethernet enhances real-time data flow from the factory floor to business systems • Four primary network levels with distinct functions explained • Overview of network topologies: star, ring, trunk • Introduction to the OSI model and its relevance to Ethernet • Comparison of Ethernet and PROFINET protocols • The importance of interoperability in industrial networks • Future outlook on Ethernet as a cornerstone of industrial connectivity Remember to keep asking why...Smart Manufacturing Resources:Smart Manufacturing GuideRead our latest article on Smart Manufacturing herehttps://eecoonline.com/inspire/smart_manufacture_concept Online Account Registration:Video Explanation of Registering for an AccountRegister for an AccountOther Resources to help with your journey:Installed Asset Analysis SupportSystem Planning SupportSchedule your Visit to a Lab in North or South CarolinaSchedule your Visit to a Lab in VirginiaSubmit your questions and feedback to: podcast@eecoaskwhy.comFollow EECO on LinkedInHost: Chris Grainger
Lieutenant Joey Sperlazza, Ed.S. is joined by J. Harris Academy of Police Training Instructor Lieutenant Collin Congleton, JD in LEO Radio Episode 32. Collin is a subject matter expert in Use of Force. Collin founded and now supervises the Force Investigation Unit for a major urban Police Department in New Jersey, is a United States Marine Corps combat veteran of Operation Iraqi Freedom and a nearly 20 year veteran law enforcement professional. He earned a B.S. in National Security Studies (Summa Cum Laude) from New Jersey City University and a Juris Doctorate from Rutgers School of Law (Newark) where he was awarded the prestigious Judge J. Skelly Wright Prize for work in civil rights. He also completed the Certified Public Manager Program at Rutgers School of Public Affairs and Administration, where his research work on police training reform was nominated for the nationally recognized American Academy of CPM's Askew Award. Some of his certifications include: FBI certified hostage and crisis negotiator; Force Science Institute certified force analyst; Gracie University certified Instructor of Gracie Survival Tactics (GST) Levels Iⅈ NJ PTC certified firearms instructor; NJ certified ICAT and ABLE instructor. Collin is also heavily involved in volunteer work supporting veterans and is an avid practitioner of Brazilian Jiujitsu. Full bios for Joey and Collin are available at JharrisTraining.com. Joey and Collin analyze three incidents in this episode of LEO Radio: • NYPD Officer Involved Shooting of Christopher Ferguson: The New York State Attorney General Office of Special Investigation is currently conducting an investigation into the death of Christopher Ferguson who died on December 5, 2024 following an encounter with members of the New York City Police Department (NYPD 77th Precinct) in Brooklyn. OSI has released videos from body-worn cameras that officers were equipped with during the incident and video from a dashboard camera. The full footage is available on the NYC AG website (https://ag.ny.gov/osi/footage/christopher-ferguson) and on the NYPD YouTube channel (https://youtu.be/I1oAPLhD9GU?si=JsdFy0uw8TZNIw-h) • Cranford, NJ Police Officer Involved Shooting of Kevin Harlfinger: According to the preliminary investigation, officers from the Cranford Police Department were pursuing a stolen vehicle when it crashed in the area of a southbound exit on the Garden State Parkway. After the crash, the driver of the vehicle, Mr. Harlfinger, exchanged gunfire with Cranford Police Officers Christopher Folinusz and Ryan McSharry. Mr. Harlfinger was pronounced deceased at the scene at approximately 12:04 a.m., December 29, 2023. A firearm was recovered near Mr. Harlfinger. Officer Folinusz sustained a non-fatal gunshot wound, was treated at a hospital, and later released. The full footage is available on the NJ AG Website: https://njoag.app.box.com/s/q0so00a1u4lbh1x005yy7gch4nuewvf5• Cleveland Police Officer Involved Shooting of Tamir Rice On November 22, 2014, 12-year-old Tamir Rice, an African-American boy, was fatally shot by Cleveland police officer Timothy Loehmann while playing with a toy gun at a recreation center; the incident sparked widespread controversy due to the rapid shooting despite the caller mentioning the gun was likely fake and the victim's young age, highlighting issues of police brutality and racial profiling within the Black Lives Matter movement. Tamir Rice was playing with a replica airsoft pistol at a park when someone called 911 to report a person with a gun. The video was released by the Cleveland Police Department, and the incident is well covered with dispatch and 911 audio by News 5 Cleveland: https://www.news5cleveland.com/news/local-news/cleveland-metro/tamir-rice-shooitng-video-warning-cleveland-police-release-surveillance-video LEO Radio is a podcast produced by the J. Harris Academy of Police Training. As always, the items described in this podcast are for information only.
"Osiągnęliśmy porozumienie. Przez tydzień trwała rozmowa na poziomie ministra ds. gospodarki z naszej strony i ds. skarbu ze strony amerykańskiej. Co do pieniędzy, zobaczymy (...). Z mojej wiedzy to będzie inna umowa, nie tylko o minerałach" - powiedział w Popołudniowej rozmowie w RMF FM ambasador Ukrainy w Polsce Wasyl Bodnar, odnosząc się do rozmów z USA dotyczących ewentualnych warunków dalszej pomocy. "Nam dawali trzy dni. Eksperci - miesiąc. Przedwczoraj minęły trzy lata" - dodał dyplomata, który zapewnił również, że Ukraina "w żadnym razie nie zapomniała o pomocy ze strony Polski".
Osoby, których talentem jest Rywalizacja, mierzą swój rozwój w konfrontacji z wynikami innych. Walczą zawsze o pierwsze miejsce i uwielbiają zawody. “Rywalizacja jest często rozumiana jako brak współpracy, a tu chodzi o zupełnie co innego, o paliwo do działania”. Trudno byłoby mi lepiej podsumować odcinek o talencie Rywalizacja lepiej niż zrobiły to osoby, które o nim opowiadały. W naszej rozmowie usłyszycie o dojrzałym talencie Rywalizacja, który dzięki różnym partnerstwom talentowym realnie pomaga osiągać zamierzone cele. Warto posłuchać jak macie ten talent wysoko, ale też jeżeli macie kogoś z talentem Rywalizacja w swoim otoczeniu. Można nauczyć się co to znaczy dojrzały talent. Zapraszam do słuchania i rozmowy! Goście i gościni odcinka Katarzyna Ostrowska – realizuje projekty w obszarach fotografii, video, grafiki i marketingu. Kieruje swoją kreatywność w stronę branży sportowej.Top 5: Zbieranie, Rozwaga, Rywalizacja, Odkrywczość, WizjonerInstagram Jan Dąbrowski – jest związany z branżą nieruchomości inwestycyjnych.Top 5: Ukierunkowanie, Uczenie się, Analityk, Osiąganie, RywalizacjaLinkedinFacebook Mariusz Szydłowski – buduje architekturę procesową (pomaga właścicielom procesów w ich optymalizacji).Top 5: CZAR, Komunikatywność, Rywalizacja, Osiąganie, UkierunkowanieLinkedinFacebook Intencjonalny newsletter Co tydzień wysyłam list, w którym zapraszam do rozmowy i zadania sobie ważnych pytań. Linki Streszczenie Rywalizacja w życiu zawodowym Dominik: Jak talent Rywalizacja jest widoczny w Waszej pracy? […] The post #257 Słownik talentów – sezon 2 – Rywalizacja (Competition) appeared first on Near-Perfect Performance.
In this conversation, Chris Glanden and Matt Canham delve into the realms of deep fakes, cognitive security, and the implications of AI technology on human agency. They explore the nuances of cognitive security, differentiating it from social engineering, and discuss the potential vulnerabilities that arise as AI continues to evolve. The conversation also touches on the OSI model and how cognitive security can be integrated into existing frameworks, highlighting the importance of understanding cognitive attacks and their implications for both humans and AI systems. In this conversation, Chris Glanden and Matt Canham delve into the evolving landscape of cognitive security, emphasizing the need for security practitioners to adopt a systems-thinking approach. They discuss the implications of AI and direct neural interfaces on security practices, the role of DeepSeek in shaping AI interactions, and insights from the Cognitive Security Institute's meetings. The conversation also touches on emerging trends in cognitive warfare and concludes with a thematic drink inspired by the complexities of the field.TIMESTAMPS:00:00 Introduction to Deep Fakes and AI Technology02:28 Understanding Cognitive Security09:58 Differentiating Cognitive Security from Social Engineering19:05 Exploring the OSI Model and Cognitive Security Layers21:48 Bringing Security Back to Earth24:26 The Role of Cognitive Security in Modern Threats25:02 AI's Impact on Security Practices30:36 DeepSeek and Its Implications33:47 Insights from the Cognitive Security Institute41:28 Emerging Trends in Cognitive Warfare45:43 The Complexity Cocktail: A Thematic ConclusionSYMLINKS:Dr. Matthew Canham – Home – https://www.canham.ai/The official website of Dr. Matthew Canham, showcasing his expertise in human–AI integration, cognitive security, and updates on his latest projects and research. Research – https://www.canham.ai/researchA dedicated section highlighting Dr. Canham's research initiatives and academic contributions in the field of human–AI integration and cognitive security.LinkedIn – https://www.linkedin.com/Dr. Canham's professional networking profile where you can learn more about his career achievements, collaborations, and thought leadership.Cognitive Security: Exploring the Human Layer w/ Dr. Matthew Canham | CSI Talks #1 – https://youtu.be/OGmvoj5Dj_AA YouTube video where Dr. Canham elaborates on cognitive security and human–AI integration, aligning closely with the conversation's focus on evolving security threats.Cognitive Security – Army Cyber Institute – https://cyber.army.mil/Research/Research-Labs/Cognitive-Security/An official U.S. Department of Defense page describing research into cognitive security—protecting decision-making under adversarial conditions. This resource underscores the growing institutional focus on the subject.Apple's Mind-Blowing Invention: AirPods That Can Read Your Thoughts – https://digialps.com/apples-mind-blowing-invention-airpods-that-can-read-your-thoughts/]An article that examines Apple's patent for AirPods designed to detect brain signals, diCONNECT WITH USwww.barcodesecurity.comBecome a SponsorFollow us on LinkedInTweet us at @BarCodeSecurityEmail us at info@barcodesecurity.com
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered... Read more »
Why do we need network models such as OSI? Network architect and author Russ White joins Holly and Ethan to talk about how network models can help engineers ask intelligent questions and understand networking problems. And OSI isn’t your only option–Russ digs into the RINA model and how it compares to OSI (which we covered... Read more »
Episode hosted by Osi Atikpoh of A Song Called Life Podcast. In Episode #215, neuroscientist Tony Nader joins Osi to discuss a groundbreaking perspective on consciousness, exploring how it serves as the essence of all existence and offering practical tools and methods to connect with our authentic inner nature. Tony Nader, M.D., Ph.D., MARR, is a medical doctor trained at Harvard University and Massachusetts Institute of Technology (Ph.D. in neuroscience), and a globally recognised Vedic scholar. As Maharishi Mahesh Yogi's successor, Dr Nader is head of the international Transcendental Meditation® organisations in over 100 countries. From the Americas to Asia, from Europe to Africa, Dr Nader guides the Transcendental Meditation program and its advanced practices, and the practical applications of this technology in all areas of national life – education, health, business, defense, agriculture, and more. Connect with Osi Atikpoh: iTunes https://podcasts.apple.com/us/podcast/a-song-called-life/id1562899908 Spotify https://creators.spotify.com/pod/show/osi-atikpoh Instagram https://www.instagram.com/asongcalledlifepodcast To order Dr Tony Nader's book Consciousness Is All There Is: https://www.drnaderbooks.com or use your favorite bookseller. Website: https://www.drtonynader.com Instagram https://www.instagram.com/drtonynader Facebook https://www.facebook.com/DrTonyNader YouTube https://www.youtube.com/@DrTonyNader X (Twitter) https://twitter.com/DrTonyNader TikTok https://www.tiktok.com/@drtonynader Linked In https://www.linkedin.com/in/drtonynader Transcendental Meditation website https://www.tm.org Link to original episode: iTunes https://podcasts.apple.com/us/podcast/episode-215-dr-tony-nader/id1562899908?i=1000683778810 Spotify https://creators.spotify.com/pod/show/osi-atikpoh/episodes/Episode-215-Dr--Tony-Nader-e2td2qv
Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastInfosec Instructor Tommy Gober joins Cyber Work Hacks to discuss the CompTIA Network+ certification. Despite often being bypassed in favor of Security+, Gober explains why Network+ is fundamental for a robust cybersecurity knowledge base. Learn about critical networking concepts like the OSI model, IP addresses and protocols, which are vital for understanding how cyberattacks work. Discover how strengthening your networking proficiency can enhance your cybersecurity career, even if you don't aim to become a network admin. Gober also shares top tips for excelling in the Network+ exam, including mastering port numbers and subnetting. Don't miss this enriching episode designed to boost your cybersecurity skills!0:00 Introduction 0:50 Cybersecurity salary ebook1:44 Overview of Network+ certification2:55 Deep dive into networking concepts5:15 Integrating Network+ with Security+7:03 Essential networking skills for cybersecurity9:03 Top tips for Network+ exam preparation10:02 Final thoughts– View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec Skills to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.
Námluvy levicových lídryň, šéfky komunistů Kateřiny Konečné a předsedkyně SOCDEM Jany Maláčové, zkrachovaly. Sen o vytvoření široké levicové koalice Stačilo! nevyšel, bude v ní chybět právě sociální demokracie.Kateřina Konečná ve středu oznámila, v jaké sestavě půjde koalice Stačilo! do zářijových sněmovních voleb: její KSČM plus dvě menší, národně konzervativní strany. Tedy bez Jany Maláčové - ačkoliv se obě veřejně měsíce vyjadřovaly, jak moc se chtějí domluvit.Překotné dění na levicové frontě podrobně probírají političtí reportéři Václav Dolejší a Lucie Stuchlíková v aktuální epizodě svého podcastu Vlevo dole.„Mám dojem, že Konečná si s Maláčovou od začátku jen hrála, lákala ji do pasti. Budila v ní falešný dojem, jaký o ni má zájem, ale ve skutečnosti o sociální demokraty nestála,“ myslí si Dolejší. „Šéfka komunistů tím jen vzala SOCDEM čas na restart před volbami. A ještě ji ušpinila koketováním s proruskými komunisty.“Kateřině Konečné se nelze divit, protože po loňských úspěších v evropských a krajských volbách si vyzkoušela, že sociální demokraty vlastně vůbec nepotřebuje. Osiřelá SOCDEM teď stojí před rozhodnutím, jakou strategii zvolit do voleb.„Nevidím už moc dobrých variant a času je málo, vždyť volby jsou za osm měsíců. Sociální demokraté do nich mohou jít sami, ale tak nemají šanci. Nebo se třeba mohou spojit s liberálními levicovými hnutími, jako jsou Budoucnost nebo Idealisté. Jenže po námluvách s komunisty by takový obrat nebyl moc věrohodný,“ říká Lucie Stuchlíková.Co má Kateřina Končená společného s Ivo Kaderkou, bývalým šéfem tenisového svazu? Kdo hacknul mladým sociálním demokratům Facebook? A máte radši uhlobarony, nebo agrobarony? V každém případě si poslechněte aktuální Reaktor.----Vlevo dole řeší politické kauzy, boje o vliv i šeptandu z kuloárů Sněmovny. Vychází každou středu v poledne.Podcast pro vás připravují Lucie Stuchlíková (@StuchlikovLucie) a Václav Dolejší (@VacDol), reportéři Seznam Zpráv.Další podcasty, ale taky články, komentáře a videa najdete na zpravodajském serveru Seznam Zprávy. Poslouchejte nás na webu Seznam Zpráv, na Podcasty.cz nebo ve své oblíbené podcastové aplikaci.Své názory, návrhy, otázky, stížnosti nebo pochvaly nám můžete posílat na adresu audio@sz.cz.Sledujte @SeznamZpravy na sociálních sítích: Twitter // Facebook // Instagram.Seznam Zprávy jsou zdrojem původních informací, nezávislé investigace, originální publicistiky.
Network engineers should be familiar with the Open Systems Interconnection (OSI) model, a framework for understanding network communications. On today’s show, Ethan and Holly delve into each of the model’s seven layers to discuss their functions, associated protocols, and practical implications for modern networking. They also talk about how the OSI model is, in fact,... Read more »
Network engineers should be familiar with the Open Systems Interconnection (OSI) model, a framework for understanding network communications. On today’s show, Ethan and Holly delve into each of the model’s seven layers to discuss their functions, associated protocols, and practical implications for modern networking. They also talk about how the OSI model is, in fact,... Read more »
On the latest Off the Edge with Cam Jordan podcast, Cam is joined by 2-time Super Bowl champ and NFL ambassador to Africa Osi Umenyiora. Osi has worked tirelessly to build the NFL game all across the continent of Africa, and he shares the success stories of players who have made the transition. He and Cam also discuss their roles in the heated New Orleans Saints vs. Atlanta Falcons rivalry. Osi reveals details of a conversation he had with Philadelphia Eagles running back Saquon Barkley to try and keep the MVP candidate in New York. He also shares his journey from Nigeria to Alabama that rivals the movie Coming to America. Osi also explains why his six sack game vs. the Eagles is not the best game of his career. The Off the Edge with Cam Jordan podcast is a production of the NFL in partnership with iHeart Media.See omnystudio.com/listener for privacy information.
On the latest Off the Edge with Cam Jordan podcast, Cam is joined by 2-time Super Bowl champ and NFL ambassador to Africa Osi Umenyiora. Osi has worked tirelessly to build the NFL game all across the continent of Africa, and he shares the success stories of players who have made the transition. He and Cam also discuss their roles in the heated New Orleans Saints vs. Atlanta Falcons rivalry. Osi reveals details of a conversation he had with Philadelphia Eagles running back Saquon Barkley to try and keep the MVP candidate in New York. He also shares his journey from Nigeria to Alabama that rivals the movie Coming to America. Osi also explains why his six sack game vs. the Eagles is not the best game of his career. The Off the Edge with Cam Jordan podcast is a production of the NFL in partnership with iHeart Media.See omnystudio.com/listener for privacy information.
The panel discusses the implications of the 2024 US elections to the tech industry Alexa's New AI Brain Is Stuck in the Lab Why do we keep changing our clocks? ChatGPT Search Online political ads--we're almost done! Elon Musk Wants You to Think This Election's Being Stolen Open-source AI must reveal its training data, per new OSI definition Chinese sanctions hit US drone maker supplying Ukraine Digital ad market booms for Big Tech Host: Leo Laporte Guests: Shoshana Weissmann, Nicholas De Leon, and Amy Webb Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: bitwarden.com/twit lookout.com NetSuite.com/TWIT ZipRecruiter.com/Twit canary.tools/twit - use code: TWIT
Google Preps AI That Takes Over Computers Researchers say an AI-powered transcription tool used in hospitals invents things no one ever said Jeff: Why Are Liberals Infuriated with the Media? Apples Have Never Tasted So Delicious. Here's Why Instagram saves the best video quality for the most popular content Video game preservationists have lost a legal fight to study games remotely Internet Archive: Vanishing Culture: A Report on Our Fragile Cultural Record Alphabet posts big revenue and profit growth More than a quarter of new code at Google is generated by AI Open-source AI must reveal its training data, per new OSI definition McDonald's Finds an Unlikely Savior to Finally Fix Its McFlurry Machines RIP Foursquare Craig gives CR $5 million for cybersecurity WordPress co-founder Matt Mullenweg says a fork would be 'fantastic' LeCun blasts Musk as the biggest threat to democracy today Workers Say They Were Tricked and Threatened as Part of Elon Musk's Get-Out-the-Vote Effort Trump's Truth Social valued at more than Musk's X after extraordinary rally Masnick on Elon Musk Events TikTok founder becomes China's richest man The Age of Cage Russian court fines Google $20,000,000,000,000,000,000,000,000,000,000,000 McKinsey's 18 next big arenas of competition Hosts: Leo Laporte, Jeff Jarvis, and Paris Martineau Download or subscribe to this show at https://twit.tv/shows/this-week-in-google. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: veeam.com uscloud.com INFO.ACILEARNING.COM/TWIT - code TWIT100 cachefly.com/twit